Our blog

Latest updates

Information security

For years, organizations have become accustomed to the “trust what’s inside, block what’s outside” model. But in a world where

Information security

An active trading arena, where information stolen from organizations is sold, exchanged, or exposed – sometimes without anyone in the organization knowing. When the organization

Privacy protection

Many organizations in Israel still refer to the term "data protection" as a recommendation. However, Amendment 13 to the Privacy Protection Law, in combination with

Cloud Security

The move to the cloud has changed the way we manage information systems – convenience, flexibility, accessibility from anywhere. But together

Privacy protection

Most managers are confident that their organization is well protected. There is antivirus, strong passwords, maybe even a cloud backup solution. But from a

Information security

Introduction: Information security – has long been no longer just a technical matter in the digital age, information security and cyber are not just a challenge

Information security

Introduction In the digital age, more and more organizations are choosing hosting services as the basis for their IT infrastructure – a solution that ensures access

Cloud computing

Transitioning to Cloud IaaS: A Practical Guide for IT Managers and Senior Management Introduction: The Infrastructure is Changing – Responsibility Remains Transitioning to a Cloud Environment

Privacy protection

A fundamental change is now occurring in the Israeli market that affects every organization that holds personal information: Amendment 13 to the Privacy Protection Law

Scroll to Top